- Serco (Kirtland AFB, NM)
- …and vulnerability assessments to support cybersecurity objectives. + Support program control processes to ensure risk mitigation and accreditation readiness. ... Kirtland AFB, New Mexico, US Information Security /Cyber 12453 Full-Time A DoD Secret security clearance with Top Secret eligibilty No - Teleworking not available… more
- Warner Bros. Discovery (Atlanta, GA)
- …and milestones. + Maintain comprehensive documentation on cloud security processes, security controls, architecture diagrams, and risk assessments. + Report ... Cryptographs, Extended Detection & Response (XDR), User Behavior Analytics, Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Serverless… more
- First Horizon Bank (Memphis, TN)
- …secrets handling and container/Kubernetes baselines where applicable. + Governance and risk : Maintain control overlays mapped to FFIEC/GLBA/PCI/NIST; lead design ... Team + Leadssecuritydesign workshops and POC efforts for new ( security ) capabilities + Validates 3rd Party/Vendor Solutions forsecurityconcerns + Aligns… more
- Under Armour, Inc. (Salem, OR)
- …Armour's Corporate, Retail, Distribution House, and Regional Data Center Networks. The Network Security Engineer will support a risk centric Global Network ... program that will help reduce our external exposure, while increasing visibility and control across the global environment. The Network Security Engineer will… more
- Leidos (Fort Meade, MD)
- …knowledge of endpoint and networking security controls; provide updates to security control guidance. + Familiarity with all related aspects of cybersecurity ... strategies in order to enable operational effectives, defense, and command and control . + Analyze policy, program management office managed systems, hardware,… more
- Trane Technologies (Minneapolis, MN)
- …oversee their development. **Core Job Responsibilities (others may be added):** + ** Risk Management :** Assess product security risks, develop comprehensive ... modeling and simulation, and data privacy impact assessments. + **Vulnerability Management :** Identify, evaluate, and verify security issues discovered through… more
- Lockheed Martin (Troy, AL)
- …of security to include personnel, physical, technical, and classification management utilizing the requirements set forth in Department of Defense Manual ... applicable\. * Completing Program Access Requests \(PAR\), classified meeting support, program management support, and security education\. **Why Join Us** Do… more
- Lockheed Martin (Orlando, FL)
- …of security to include personnel, physical, technical, and classification management utilizing the requirements set forth in Department of Defense Manual ... * Completing Program Access Requests \(PAR\), classified meeting support, program management support, and security education\. **Why Join Us?** We're… more
- ERCOT (Austin, TX)
- …requirements of business initiatives. Analyzes complex projects to identify potential vulnerabilities, security control points, and risk mitigation measures ... role. ADDITIONAL JOB DUTIES + Develops the ERCOT Cyber security Architecture Strategy + Serves as the information ...optimized + traffic flows across the network (eg, Transmission Control Protocol (TCP) and Internet Protocol (IP), Open -… more
- SSM Health (Janesville, WI)
- …assesses, monitors, programs, and operates the building security alarm, video management , and access control systems for all buildings in their purview, ... may include contracted valet service, employee badging and access control management , visitor management , employee...use of counseling and/or the disciplinary process. + Performs risk assessments assigned sites and augments security … more